Vendors

Technology Partners

Aligning with other industry innovators and leaders
By working with other industry innovators and leaders, we bring more advanced threat, vulnerability and compliance management to the market to better serve business needs. Our technology partnerships augment the broad portfolio of security services SMSAM delivers to help businesses fight cybercrime, protect data and reduce security risk.

Arbor Networks

Arbor Networks secures the world’s most demanding and complex networks from DDoS attacks and advanced threats. Arbor Networks customers gain a micro view of their own network, through our suite of products, combined with a macro view of global Internet traffic and emerging threats, through our ATLAS threat intelligence infrastructure. See, understand and solve more security threats with Arbor Networks.

LogRhythm

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

ForeScout Technologies

ForeScout CounterACT® sees desktops, laptops, tablets, smartphones, IoT endpoints, peripherals and rogue devices the instant they connect to your network—even if they don’t have security agents installed. It discovers servers, routers and access points, too. CounterACT gathers in-depth insights about device types, users, applications, operating systems and more. Then it continuously monitors the devices. No agents. No excuses. No kidding.

Gigamon

Gigamon provides active visibility. Having the industry’s first Security Delivery Platform, GigaSECURE®, and the Visibility Fabric™, an intelligent architecture for enterprises, data centers and service providers around the globe, Gigamon’s technology empowers security and infrastructure architects, managers and operators with pervasive and dynamic intelligent visibility of traffic across both physical and virtual environments without affecting the performance of the production network

Extrahop

ExtraHop is a stream analytics platform that provides the fastest, richest, most complete visibility into all activity in your IT infrastructure. The ExtraHop platform turns unstructured network data into structured wire data, and runs real-time analytics on it, so you get critical information the instant you need it.

Akamai Technologies

Akamai is the global leader in Content Delivery Network (CDN) services, making the Internet fast, reliable and secure for its customers. The company's advanced web performance, mobile performance, cloud security and media delivery solutions are revolutionizing how businesses optimize consumer, enterprise and entertainment experiences for any device, anywhere.

iBoss

We provide solutions that protect thousands of enterprises, service providers and government networks against a new age of cyber-threats. Our game-changing Secure Web Gateway Platform with innovative architecture is backed by over 75 patents and patents pending, and chosen by over 4000 enterprises worldwide to increase their security postures. This has made iboss one of the fastest growing cybersecurity companies in the market.

ProofPoint

A next-generation cybersecurity company protecting people, data, and brands from advanced threats and compliance risks. Proofpoint protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world’s most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.

LightCyber

LightCyber Magna accurately and efficiently detects active attacks regardless of malware status (known or unknown) or attacker techniques – which may include use of no malware at all – to reduce attacker dwell time and minimize the damage done.

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available. Leveraging pre-built connectors and Policy Federation, we can automatically protect more files faster than anyone.

IXIA COM

At Ixia, we deliver a powerful combination of innovative solutions and trusted insight to support your network and security products, from concept to operation. Whether you are preparing your product for launch, deploying an application, or managing a product in operation, we offer an extensive array of solutions in testing, visibility, and security—all in one place.

SpyCloud

SpyCloud helps businesses of all sizes prevent data breaches and account takeover attacks by alerting when employee or company assets have been compromised. We accomplish this through our early-warning breach detection service powered by a world-class team of intelligence analysts.

Data Sunrise

DataSunrise is an innovative software company dedicated to delivering data security products. Our company was founded by a talented team with strong background in enterprise security, data protection and database management systems.

DUO Security

A worldwide leader in secure access for companies of all sizes. Duo Security protects organizations against data breaches by ensuring only legitimate users and appropriate devices have access to sensitive data and applications - anytime, anywhere.

Certes Networks

Certes Networks’ solutions safeguard enterprise data communications to ensure privacy compliance and block the top data breach attack vectors. Banks, financial institutions, healthcare organizations, governments and other companies in nearly 100 countries rely on Certes’ security and compliance solutions to protect their sensitive networked applications.

Barracuda

Barracuda Networks, Inc. offers industry-leading solutions designed to solve mainstream IT problems – efficiently and cost effectively – while maintaining a level of customer support and satisfaction second to none. Our products span three distinct markets, including: 1) content security, 2) networking and application delivery and 3) data storage, protection and disaster recovery.

CrowdStrike

CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture.

GTB Technologies

GTB Technologies is the only Data Protection / Data Loss Prevention solution (on-premises, off-premises and everywhere in between including the cloud) which can prevent the loss of data from Malware, Frenemies and trusted insiders by blocking sensitive data (structured or unstructured) regardless of file type, port or channel, in real-time with impeccable accuracy thus providing true cyber security and insider threat defense whether it be on premise, off premise, in the cloud or as a managed service.

Javalin Networks

avelin AD|Protect is an agentless, artificial intelligence platform that actively and autonomously monitors, alerts, and stops intruders from penetrating the domain environment. It presents the intruder with a false perception of the internal topology and Active Directory, which masks the real environment and prevent attackers from moving off of that one compromised machine.

Demisto

Demisto Enterprise delivers a complete solution that helps Tier-1 through Tier-3 analysts and SOC managers to optimize the entire incident life cycle while auto documenting and journaling all the evidence. More than 100+ integrations enable security orchestration workflows for incident management and other critical security operation tasks.

ProtectWise

ProtectWise shifts network security to the cloud to provide complete visibility and detection of enterprise threats and accelerated incident response. By harnessing the power of the cloud, the ProtectWise Grid™ has the unique ability to create an unlimited retention window with full-fidelity forensics, automated retrospection and advanced visualization — all with the ease and cost-savings of an on-demand deployment model.

Ericom

Ericom Software is a global leader in securely connecting the unified workspace. Ericom empowers today’s connected workforce and the IT organizations that support them by securing and optimizing desktop, application, and web content delivery to any device, anywhere. Founded in 1993, Ericom provides enterprise-grade secure remote access, desktop virtualization (VDI), and web security solutions to organizations across all industries.

Votiro

The detection of undisclosed and zero-day exploits is extremely difficult, if not impossible. Votiro's goal is to provide solutions to safeguard against undisclosed and zero-day exploits. Based on the company's patented Advanced Content Disarm and Reconstruction technology, Votiro solutions apply an active cleansing process to all incoming files and email messages, neutralizing undisclosed exploits without having to detect signatures. The process is automatic and therefore does not rely on employees’ assessment of incoming files’ safety.

NopSec

NopSec operates with one mission: to help people make better decisions to reduce security risks. Our team is passionate about building technology to help customers simplify their work, manage security vulnerability risks effectively, and empower them to make more informed decisions. Our software-as-a-service approach to vulnerability risk management offers an intelligent solution to dramatically reduce the turnaround time between identification of critical vulnerabilities and remediation.

Cyber-X Labs

CyberX provides the most widely-deployed industrial cybersecurity platform for continuous, non-invasive risk assessment and M2M anomaly detection. Our purpose-built platform enables organizations to detect and respond faster to risk in their industrial networks. Recognized by Gartner as a “Cool Vendor,” CyberX is the only ICS security vendor selected for the SINET16 Innovator Award sponsored by the US DHS and DoD.

Q6 Cyber

At Q6 Cyber, we have been at the front lines of law enforcement, intelligence agencies, and corporations fighting cyber threats and cyber crime. We deeply understand the myriad of challenges that organizations face and the limitations of traditional intelligence offerings.

Logpoint

LogPoint is a global security analytics company founded in Denmark in 2008 and has been growing ever since. Our headquarters is still located in Copenhagen, and we have sales and support offices located across Europe and partnerships that reach across the globe.